Method for implementing authentication by entity authentication centre

A technology of authentication center and authentication method, applied in user identity/authority verification and key distribution, which can solve the problems of not being able to adapt to business development, inconvenient for billing, and unable to obtain derived keys, etc.

Inactive Publication Date: 2007-07-18
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing general authentication framework does not divide the security level of authentication and key negotiation between EAC and business entities, so that EAC cannot provide business entities with authentication of different security levels, so that derived keys that meet the business security level requirements cannot be obtained. key, it is not convenient for operators to carry out more reasonable and accurate billing for services with different security level requirements, and cannot well adapt to the needs of business development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing authentication by entity authentication centre
  • Method for implementing authentication by entity authentication centre
  • Method for implementing authentication by entity authentication centre

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109]Embodiment 1, the service communication between SS and SP is realized by sending a service request message from SS to SP. FIG. 4 is a flow chart of Embodiment 1 of realizing service communication between SS and SP of the present invention, which specifically includes the following steps:

[0110] Step 400: the SS sends a service request message to the SP, and the service request message carries the temporary identity of the SS and the UID corresponding to the service applied by the SS.

[0111] In this step, assuming that the security level field storing the security level required by the SS is set in the temporary identity, the SS can search for the security level requirements corresponding to the requested service through the service security level list stored by itself, and find the security level that meets the security level. The temporary identity associated with the shared key Ks.

[0112] If the security level field is not set in the temporary identity, the secur...

Embodiment 2

[0127] Embodiment 2, the business communication between the SS and the SP is realized by sending an authentication request message to the EAC through the SS. FIG. 5 is a flow chart of the second embodiment of the business communication between the SS and the SP of the present invention, which specifically includes the following steps:

[0128] Step 500: When the SS sends an authentication request message to the EAC, the authentication request message also carries the PID of the SS and the UID corresponding to the applied service.

[0129] The authentication request message may also carry authentication capability information of the service entity, that is, supported authentication modes.

[0130] Step 501: After receiving the authentication request message, the EAC queries the preset service security level list to obtain the security level corresponding to the received UID. If the temporary identity of the SP can be obtained through the information stored in association with th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses an authentication method realized by an entity authentication center(EAC) including: the EAC gets an authentication mode meeting the safety grade supported by EAC and said service entity based on the required safety grade and signed information of said entity, EAC and said entity authenticate in the mode and negotiate to generate a shared cryptographic key, EAC distributes safety grade to the key and distributes related information to the entity asking for authentication and stores the association of the related information, shared key and its safety grade in EAC and said service entity, in this invention, EAC provides authentication of different safety grades to service entities and different services among different entities set up trust relationship of different safety levels for communication.

Description

technical field [0001] The invention relates to general authentication technology, in particular to a method for implementing authentication by an Entity Authentication Center (EAC, EntityAuthentication Center). Background technique [0002] Fig. 1 is a schematic diagram of an end-to-end communication authentication architecture in the prior art. As shown in Fig. 1, this architecture is applicable to different mobile network standards, and its function is to establish a mutual trust relationship between different types of entities, which is a real sense of A common authentication framework. The network elements involved in the authentication architecture shown in Figure 1 include three business entities: Service Subscriber (SS, Service Subscriber), Service Subscriber / Provider (SSP, Service Subscriber and Provider), and Service Provider (SP, Service Provider) In addition, the operator network also includes an EAC and an Entity Subscription Database (ESD, Entity Subscription ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L63/062H04L63/08H04L63/105
Inventor 杨艳梅位继伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products